Search Results

Search found 5287 results on 212 pages for 'physical computing'.

Page 138/212 | < Previous Page | 134 135 136 137 138 139 140 141 142 143 144 145  | Next Page >

  • I screwed up, exit in .bashrc

    - by camel_space
    I put "exit" in my .bashrc file. I don't have physical access to the machine so to connect to it I use ssh. I don't have root privileges. Every time I connect to the server, the connection automatically closes. So far, I've tried: Overwriting .bashrc with scp and sftp. The connection closes before I can do anything. Using a few different GUI programs to access ssh (connection closes) Overwriting the file with ftp. (can't use ftp) From my home computer $ ssh host "bash --noprofile --norc" (connection closes) $ ssh host "mv .bashrc bashrc_temp" (connection closes) $ ssh host "rm .bashrc" (same thing) $ ssh host -t (connection closes) Is there anything I can do to disable .bashrc or maybe overwrite the file before .bashrc is sourced?

    Read the article

  • Is it possible to put only the boot partition on a usb stick?

    - by Steve V.
    I've been looking at system encryption with ArchLinux and i think I have it pretty much figured out but I have a question about the /boot partition. Once the system is booted up is it possible to unmount the /boot partition and allow the system to continue to run? My thought was to install /boot to a USB stick since it can't be left encrypted and then boot from the USB stick which would boot up the encrypted hard disk. Then I can take the USB key out and just use the system as normal. The reason I want to do this is because if an attacker was able to get physical access to the machine they could modify the /boot partition with a keystroke logger and steal the key and if they already had a copy of the encrypted data they could just sit back and wait for the key. I guess I could come up with a system of verifying that the boot has been untouched at each startup. Has this been done before? Any guidance for implementing it on my own?

    Read the article

  • USB hardwares driver installation

    - by unknown (google)
    I am using few USB hardwares like camera and scanners with my software application. I plugged my hardware in USB A installed the drivers and the device was working properly. Now I tried to connect the same hardware in USB B (ie, some other USB port), and again it is asking for the driver installation. I need to know the reason behind this. Is it something to do with the particular device or system? Anywork around for this during the first time driver installation? Please anyone explain me how the USB works physical address, how it is assigned and how the driver for a device getting installed. Thanks in advance.

    Read the article

  • How to prevent firefox from updating

    - by Larry
    I have firefox 3.6.x in Mint Linux. For physical problems -- eyes and color, I want to keep this version and not do any updates ever to it. I don't know if it is a firefox or linux issue, but nothing seems to work. It should not be rocket scientist enabled. :P This is what I have tried: Update Manager and added to ignore package --firef0x* Fully removed all traces of firefox and reinstalled 3.6.28 In firefox, set the upgrade options (3) of them to unselected and saved. Scanned computer for firef* to insure all traces were removed, to include /usr/bin/firefox. Using Mint Linux 9, otherwise fully upgraded for packages. That's the main things I've done. My major issues is the later versions of that software are almost impossible for me to see.

    Read the article

  • How to export an image from Photoshop to PDF while preserving the exact size?

    - by romkyns
    There used to be a PDF export option in Photoshop, but it's gone in CS4. What replaced it is Bridge, however no matter what I do, Bridge ends up resizing my image. The physical dimensions (cm/inches) in the final PDF are not what they are in Photoshop. Any tips on exporting an image without messing up its size? (Clarification: I want the final PDF to contain a page of the size I specify, with a white background, and my image positioned somewhere on this page such that the image width/height in cm is exactly the same in the PDF as it was in Photoshop.)

    Read the article

  • ZFS Configuration advice

    - by rbarrette
    I need some advice on configuring ZFS. Here is what I have: Physical Disks: 4x 3 TB 2x 2 TB 2x 1 TB What is the best configuration for my Vdevs and storage pool. I want to maximaze space but still maintain redundancy. Should I just get 2 more 3TB's and just create 2x 3-3TB raid2z storage pools? Create a 1x 4-3TB raidz2 vdev? Can I put redundancy at the pool level and create individual vdevs for each drive and then add 2x 1TB+2TB striped vdevs to keep all vdevs the same size. Keep in mind I do need to migrate data from the smaller drives and am planning on adding more 3tb drives later on. What do you think?

    Read the article

  • Nginx load distribution and multi-domain SSL

    - by Steve Clark
    I'm researching into the best methods of two new parts of our infrastructure, hopefully finding a single solution for both. 1) We're currently running a single application server, and we're going to be adding an additional application server and load balance between the two. 2) We handle a few thousand domains across the application server(s), and we're looking to support SSL. The best method i've come across so far is using nginx for it's Load Distribution to serve the requests to the application servers, and for it's SSL support. If a request is using SSL, nginx accepts the request on, terminates SSL and pipes to apache (app servers). Now, that's all good, but i'm yet to figure out how we can let nginx handle multiple domains using SSL. We're potentially looking at using UCC SSL Certs, so we can support 150 domains on a single certificate, with each cert on a single IP. I'm all new to this (My experience is just with physical load balancers and a single domains on SSL), so any advice would be very much appreciated.

    Read the article

  • Install Windows with QEMU

    - by Radium
    I want to understand if it is possible to install Windows from Qemu to a physical HDD. I was trying to do that by doing something like this: qemu-system-x64 -m1024 -vnc :1 -hda /dev/sda -cdrom .../Windows.iso Installed successfully. But when i tried to boot normally got a blue screen telling me that a hardware change appeared so go away. I guess the problem is not because of QEMU-CPU emulation or smth, but because of HDD`s UID change which is used inside of Windows registry. Am i right? So if yes how to workaround this? Maybe i need to prepare Windows before the reboot? I have successfully installed FreeBSD via QEMU and thought with Windows it will go the same ...

    Read the article

  • Overheating on Ubuntu 12.04

    - by mati
    I have a Dell Inspiron Q17R with two graphic cards and I noticed that it is overheating. I installed Bumblebee, Jupiter and Flashblock, and I followed this guide as well, but it still got up to 74C. Is there anything more I can do? It still doesn't really seem to be working well and the fan keeps spinning really fast. After performing the following test: sensors in the terminal, this is what I got: Adapter: Virtual device temp1: +75.0°C (crit = +100.0°C) temp2: +75.0°C (crit = +100.0°C) coretemp-isa-0000 Adapter: ISA adapter Physical id 0: +68.0°C (high = +86.0°C, crit = +100.0°C) Core 0: +68.0°C (high = +86.0°C, crit = +100.0°C) Core 1: +65.0°C (high = +86.0°C, crit = +100.0°C) it doesn't look good.

    Read the article

  • AD password not synchronising properly

    - by Kaczmar
    I have 600+ users in AD, but only one causes me trouble. The problem is I can reset his password from AD, he can then log in to his machine. After that he would like to change his password from Windows 7, and proceeds without errors. Logs out or locks the workstation but cannot access it again using either old or new password. So I have to reset it again and he can only use the one I provide for him. All our machines are in the same physical location in the same subnet. Functional level is 2003. I'm totally out of ideas. I could create him new user account, but I'd possibly like to know what causes this. I can only suspect some sort of synchronisation problems but other accounts work fine, and I don't know how to dig deeper into this. Thanks, Piotr

    Read the article

  • Use System Restore to rescue lost user profile in Win XP?

    - by im_chc
    Hi! My win XP account profile has recently been "reset". Many app settings are lost. For example, the "recent project" list in VS 2005 is empty. There should be lots of other stuffs that are painfully lost without me knowing! What can I do? Can I retrieve the app settings from System Restore? I don't have much confidence on this util, even tho I think restoring to a point when the profile still works, and back up away the C:\Documents and Settings (is it where all the app setting files are located?), that should work... Is it reliable to restore to a previous restore pt and then goes back to the latest RP? I've googled on System Restore, looks like what the util does is just back up some physical files, and restore them when doing System Restore. That sounds quite safe, but I am still uncomfortable to this. Thx for u guys' help in advance!

    Read the article

  • Is it possible to run a "Windows Server 2008 R2 SP1 Hyper-V Virtual Machine" on Windows 7x64 Pro machine?

    - by tbone
    Specifically, I want to run this: http://www.microsoft.com/en-us/download/details.aspx?displaylang=en&id=27417 This download contains a three Windows Server 2008 R2 SP1 Hyper-V Virtual Machine set for evaluating and demonstrating Office 2010, SharePoint 2010 and Project Server 2010. System requirements Supported operating systems: Windows Server 2008 R2 Additionally you will need: •Windows Server 2008 R2 (SP1 recommended) with the Hyper-V role enabled. •Drive Formatting: NTFS •Processor: Intel VT or AMD-V capable •RAM: 8 GB or more recommended •Hard disk space required for install: 100 GB ------------------------- So, the above text seems to indicate that you need a physical Windows 2008 Server (r2) server running, but from the googling I've done on the subject I've yet to come across a discussion that definitively answers the question. Many posts I've read seem to indicate it might be possible to run it on Windows 7 using one of the following: VirtualBox, Windows Virtual PC, VMWare but I'm not entirely sure.

    Read the article

  • Generating a beveled edge for a 2D polygon

    - by Metaphile
    I'm trying to programmatically generate beveled edges for geometric polygons. For example, given an array of 4 vertices defining a square, I want to generate something like this. But computing the vertices of the inner shape is baffling me. Simply creating a copy of the original shape and then scaling it down will not produce the desired result most of the time. My algorithm so far involves analyzing adjacent edges (triples of vertices; e.g., the bottom-left, top-left, and top-right vertices of a square). From there, I need to find the angle between them, and then create a vertex somewhere along that angle, depending on how deep I want the bevel to be. And because I don't have much of a math background, that's where I'm stuck. How do I find that center angle? Or is there a much simpler way of attacking this problem?

    Read the article

  • why don't more programming languages have builtin interfaces to the window manager?

    - by Naveen
    Programming is at the heart about automating tasks on a computer. Presumably those tasks would normally be done manually by a human. Humans use the computer through the keyboard, mouse, and interaction with the console or the window manager. But very few languages have built in functions that provide an interface to these basic computing objects. A notable exception is autohotkey, an open source language on windows, providing builtin functions that allow the following simple tasks: * Get Pixel Information * Get mouse position * Keyboard macros * Simulate key strokes * Simulate mouse click * Window management See examples on rosettacode. There have been various attempts on linux, many of which were stopped without explanation. One is the inactive tcl library: android. Search google code for android, lang:tcl

    Read the article

  • How to identify who is using Hardware Reserved Memory in Windows 7

    - by blasteralfred
    I run Windows 7 x86 Home Premium. I have an installed physical memory of 4 GB, out of which, 2.96 GB is usable (My Computer Properties). I checked the memory usage using Resource Monitor and found 3036 MB / 4096 MB is available. I noticed that 1060 MB is unavailable since it is reserved by some "Hardware component(s)". I would like to know which hardware component is using this 1060 MB. Is there any way or tool to identify this? Note: I know that Windows 7 Home Premium x86 supports a maximum of 4GB RAM.

    Read the article

  • Binomial test in Python for very large numbers

    - by Morlock
    I need to do a binomial test in Python that allows calculation for 'n' numbers of the order of 10000. I have implemented a quick binomial_test function using scipy.misc.comb, however, it is pretty much limited around n = 1000, I guess because it reaches the biggest representable number while computing factorials or the combinatorial itself. Here is my function: from scipy.misc import comb def binomial_test(n, k): """Calculate binomial probability """ p = comb(n, k) * 0.5**k * 0.5**(n-k) return p How could I use a native python (or numpy, scipy...) function in order to calculate that binomial probability? If possible, I need scipy 0.7.2 compatible code. Many thanks!

    Read the article

  • spontaneous hard disk password

    - by sc
    I had an HP proliant server go down recently. All of the sudden the sas controller (e200i) would not see any of the physical disks. New disks were detected just fine. I thought it was odd that all 6 disks would go down at one time so sent them to a data recovery firm to find out what happened. I'm being told that, somehow, all of the disks were spontaneously password protected. These are Hitachi 2.5" drives and I guess this is something of a known issue. The company has worked for a while to try and recover them, with no luck. Has anyone had experience with this? Any recommendations for how to recover the drives or a company that might have the expertise to do so?

    Read the article

  • Cannot login as root to centos server

    - by perpetual_dream
    I used to login as :ssh root@servip with a password authentication into my centos 6 server. I am not sure if what I have done has caused this, but while trying to get over my problem of accessing webmin remotely I followed the following tutorial until I reached: adding auth required pam_google_authenticator.so into /etc/pam.d/sshd. Then by mistake, I have closed the ssh session. When I tried to login in back with the usual password, I get: Permission denied, please try again error. How can I get over this problem? I don't have a physical access to the server.

    Read the article

  • Enlarge partition on SD card

    - by chenwj
    I have followed Cloning an SD card onto a larger SD card to clone a 2G SD card to a 32G SD card, and the file system is ext4. However, on the 32G SD card I only can see 2G space available. Is there a way to maximize it out? Here is the output of fdisk: Command (m for help): p Disk /dev/sdb: 32.0 GB, 32026656768 bytes 64 heads, 32 sectors/track, 30543 cylinders, total 62552064 sectors Units = sectors of 1 * 512 = 512 bytes Sector size (logical/physical): 512 bytes / 512 bytes I/O size (minimum/optimal): 512 bytes / 512 bytes Disk identifier: 0x000e015a Device Boot Start End Blocks Id System /dev/sdb1 * 32 147455 73712 c W95 FAT32 (LBA) /dev/sdb2 147456 3994623 1923584 83 Linux I want to make /dev/sdb2 use up the remaining space. I try resize2fs /dev/sdb after dd, but get message below: $ sudo resize2fs /dev/sdb resize2fs 1.42 (29-Nov-2011) resize2fs: Bad magic number in super-block while trying to open /dev/sdb Couldn't find valid filesystem superblock. Any idea on what I am doing wrong? Thanks.

    Read the article

  • Do memory cards have any max file size limitation?

    - by Dmitriy R
    I am not sure where to ask this question, so perhaps it is physical limitation. I have a 8 GB flash micro SD memory card. When I copy any file size of up to few gigabytes, copying happens normally. But if I am trying to copy file over 4 GB file, then the system tells me like insufficient memory on card, although 8 GB is available. So perhaps only 32 bit address is used for keeping size of file in micro SD card, or is my micro SD defective?

    Read the article

  • Unauthorized access error to html pages in IIS 7.0

    - by George2
    I am using VSTS 2008 + C# + .Net 3.5 + IIS 7.0. I have created a new web site and put an html file into the directory. And when I use browse function in IIS manager to browse the html file, I met with the following error, any ideas what is wrong? BTW: I am very confused about unauthorized error since I run the worker process under administrator account. From the error message, I am confused why the logon method is anonymous and not using administrator account? HTTP Error 401.3 - Unauthorized You do not have permission to view this directory or page because of the access control list (ACL) configuration or encryption settings for this resource on the Web server. Module IIS Web Core Notification AuthenticateRequest Handler StaticFile Error Code 0x80070005 Requested URL http://localhost:80/a.html Physical Path C:\test\simplehosttest\a.html Logon Method Anonymous Logon User Anonymous thanks in advance, George

    Read the article

  • Routing between two subnets. (Need Solution)

    - by rehanplus
    Need help according to scenario given: Client end PCs: 400 + Network : Server 1 (Linux) : 192.168.2.0/24 (For Application, Internet not working) GW: 192.168.2.1 Clients: 192.168.2.1 - 254 Server 2 (Linux) : 192.168.3.0/24 (For Internet users) GW: 192.168.3.1 Clients: 192.168.3.2 - 254 Server 2 is connected to DSL Broadband. Server 1 and Server 2 both are on same physical network i.e. Same switches. Current issue: i have to deploy a file and print server but this server will be accessed by both (192.168.2.x and 192.168.3.x) one same workgroup. as both subnets are on same switched network. Limitations: Currently there is no hardware routers and firewall. Need to complete this task with Linux / Windows / AD. Tested / Worked so far: Configured one PC with two NIC's With the IPS: NIC 1 : 192.168.3.2 GW: 192.168.3.1 Subnet: 255.255.255.0 NIC 2 : 192.168.2.2 GW: Empty Subnet: 255.255.255.0 Kindly provide any solution what should i do to get sharing enable on both Subnets. Thank you All

    Read the article

  • Cross platform KVM over ethernet

    - by Falmarri
    I'm not sure if this exists, but this is what I'd like to do. I have a laptop and a desktop that I work on about equally. The laptop runs windows 7 and the desktop is on kubuntu 10.04. What I want to be able to do is be able to drag my mouse accross my screen and have it act like my laptop is a second monitor. Whereby I can use my desktop mouse, drag it say to the left off of my desktop monitor, and use it on my laptop (I don't care about the keyboard, just the mouse). Is that possible? Are there any other solutions that exist? I'd prefer not to have a physical kvm switch.

    Read the article

  • Use System Restore to rescue lost user profile in Win XP?

    - by im_chc
    Hi! My win XP account profile has recently been "reset". Many app settings are lost. For example, the "recent project" list in VS 2005 is empty. There should be lots of other stuffs that are painfully lost without me knowing! What can I do? Can I retrieve the app settings from System Restore? I don't have much confidence on this util, even tho I think restoring to a point when the profile still works, and back up away the C:\Documents and Settings (is it where all the app setting files are located?), that should work... Is it reliable to restore to a previous restore pt and then goes back to the latest RP? I've googled on System Restore, looks like what the util does is just back up some physical files, and restore them when doing System Restore. That sounds quite safe, but I am still uncomfortable to this. Thx for u guys' help in advance!

    Read the article

  • How to access vm inside a vm via VNC?

    - by can.
    For some reasons I installed virtual machines inside a virtual machine, like this: A( B( C )) where A is the physical machine, B is a vm and the network type is NAT. And C is also a virtual machine and the network type is bridged. The OSes are Ubuntu 12.04 and the hypervisors are kvm. I can access B via VNC and via ssh from A, but for C I can't use ssh because C has no IP address at the start. And I assume I can only access C via VNC. I tried something like(on A): iptables -t nat -A PREROUTING -d $ip-of-A -p tcp --dport 6500 -j DNAT --to-destination $ip-of-B:5900 (I referred to this) But it doesn't work. And I'm reading the man pages of iptables and hope someone could help :)

    Read the article

< Previous Page | 134 135 136 137 138 139 140 141 142 143 144 145  | Next Page >